Sciweavers

1194 search results - page 150 / 239
» Virtualization of Hardware - Introduction and Survey
Sort
View
SIGMETRICS
2010
ACM
103views Hardware» more  SIGMETRICS 2010»
15 years 2 days ago
VM power metering: feasibility and challenges
This paper explores the feasibility of and challenges in developing methods for black-box monitoring of a VM's power usage at runtime, on shared virtualized compute platforms...
Bhavani Krishnan, Hrishikesh Amur, Ada Gavrilovska...
CCS
2011
ACM
14 years 5 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
144
Voted
GRID
2003
Springer
15 years 10 months ago
Faults in Grids: Why are they so bad and What can be done about it?
Computational Grids have the potential to become the main execution platform for high performance and distributed applications. However, such systems are extremely complex and pro...
Raissa Medeiros, Walfredo Cirne, Francisco Vilar B...
BMCBI
2008
115views more  BMCBI 2008»
15 years 5 months ago
BioGraphE: high-performance bionetwork analysis using the Biological Graph Environment
Background: Graphs and networks are common analysis representations for biological systems. Many traditional graph algorithms such as k-clique, k-coloring, and subgraph matching h...
George Chin Jr., Daniel G. Chavarría-Mirand...
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 11 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...